{"id":2695,"date":"2023-07-24T01:12:07","date_gmt":"2023-07-24T01:12:07","guid":{"rendered":"http:\/\/thisbiginfluence.com\/?p=2695"},"modified":"2023-07-24T01:12:07","modified_gmt":"2023-07-24T01:12:07","slug":"chinas-breach-of-microsoft-cloud-email-may-expose-deeper-problems","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=2695","title":{"rendered":"China\u2019s Breach of Microsoft Cloud Email May Expose Deeper Problems"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">Microsoft <a data-offer-url=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/14\/analysis-of-storm-0558-techniques-for-unauthorized-email-access\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/14\/analysis-of-storm-0558-techniques-for-unauthorized-email-access\/&quot;}\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/07\/14\/analysis-of-storm-0558-techniques-for-unauthorized-email-access\/\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a> final week that its \u201cinvestigations haven&#8217;t detected some other use of this sample by different actors and Microsoft has taken steps to dam associated abuse.\u201d But when the stolen signing key might have been used to breach different providers, even when it wasn\u2019t used this fashion within the latest incident, the discovering has vital implications for the safety of Microsoft\u2019s cloud providers and different platforms.<\/p>\n<p class=\"paywall\">The assault \u201cappears to have a broader scope than initially assumed,\u201d the Wiz researchers wrote. They added , \u201cThis is not a Microsoft-specific difficulty\u2014if a signing key for Google, Fb, Okta, or some other main id supplier leaks, the implications are onerous to understand.\u201d<\/p>\n<p class=\"paywall\">Microsoft\u2019s merchandise are ubiquitous worldwide, although, and Wiz\u2019s Luttwak emphasizes that the incident ought to function an vital warning.<\/p>\n<p class=\"paywall\">\u201cThere are nonetheless questions that solely Microsoft can reply. For instance, when was the important thing compromised? And the way?\u201d he says. \u201cAs soon as we all know that, the subsequent query is, do we all know it\u2019s the one key that that they had compromised?<\/p>\n<p class=\"paywall\">In response to China\u2019s assault on US authorities cloud electronic mail accounts from Microsoft\u2014a marketing campaign that US officers have <a href=\"https:\/\/www.nytimes.com\/2023\/07\/20\/us\/politics\/china-hacking-official-email.html\">described publicly as espionage<\/a>\u2014Microsoft introduced this previous week that it&#8217;ll make extra of its cloud logging providers free to all clients. Beforehand, clients needed to pay for a license to Microsoft&#8217;s Purview Audit (Premium) providing to log the information.<\/p>\n<p class=\"paywall\">The US Cybersecurity and Infrastructure Safety Company\u2019s government assistant director for cybersecurity, Eric Goldstein, <a data-offer-url=\"https:\/\/www.cisa.gov\/news-events\/news\/when-tech-vendors-make-important-logging-info-available-free-everyone-wins\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/news-events\/news\/when-tech-vendors-make-important-logging-info-available-free-everyone-wins&quot;}\" href=\"https:\/\/www.cisa.gov\/news-events\/news\/when-tech-vendors-make-important-logging-info-available-free-everyone-wins\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a> in a weblog put up additionally printed this previous week that \u201casking organizations to pay extra for crucial logging is a recipe for insufficient visibility into investigating cybersecurity incidents and should enable adversaries to have harmful ranges of success in concentrating on American organizations.\u201d<\/p>\n<p class=\"paywall\">Since OpenAI revealed ChatGPT to the world final November, the potential of generative AI has been thrust into the mainstream. Nevertheless it is not simply textual content that may be created, and most of the rising harms of the know-how are solely beginning to be realized. This week, UK-based little one security charity the Web Watch Basis (IWF), which scours the online for little one sexual abuse photographs and movies and removes them, revealed it&#8217;s <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-66129575\">increasingly finding AI-generated abuse images<\/a> on-line.<\/p>\n<p class=\"paywall\">In June, the charity began logging AI photographs for the primary time\u2014saying it discovered seven URLs sharing dozens of photographs. These included AI generations of women round 5 years previous posing bare in sexual positions, in line with the <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-66129575\">BBC<\/a>. Different photographs had been much more graphic. Whereas generated content material solely represents a fraction of the kid sexual abuse materials obtainable on-line total, its existence is worrying consultants. The IWF says it discovered guides on how individuals might create lifelike photographs of youngsters utilizing AI and that the creation of the pictures, which is against the law in lots of international locations, is more likely to normalize and encourage predatory behaviors towards kids.<\/p>\n<p class=\"paywall\">After threatening to roll out international password-sharing crackdowns for years, Netflix launched the initiatives within the US and UK on the finish of Could. And the hassle appears to be going as deliberate. In earnings reported on Thursday, the corporate mentioned that it added 5.9 million new subscribers up to now three months, a leap almost thrice larger than analysts predicted. Streaming subscribers have grown accustomed to sharing passwords and balked at Netflix\u2019s strict new guidelines, which had been prompted by stagnating new subscriber signups. However finally, no less than a portion of account-sharers appear to have bit the bullet and began paying on their very own.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/china-breach-microsoft-cloud-email-may-expose-deeper-problems\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft wrote final week that its \u201cinvestigations haven&#8217;t detected some other use of this sample by different actors and Microsoft has taken steps to dam associated abuse.\u201d But when the stolen signing key might have been used to breach different providers, even when it wasn\u2019t used this fashion within the latest incident, the discovering has [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2697,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[3364,919,120,3367,3365,3366,298,3368],"class_list":["post-2695","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-breach","tag-chinas","tag-cloud","tag-deeper","tag-email","tag-expose","tag-microsoft","tag-problems"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/2695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2695"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/2695\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/2697"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2695"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}